首页> 外国专利> Last line of defense, guarantee and provide sufficient reliability / AUTH CODE

Last line of defense, guarantee and provide sufficient reliability / AUTH CODE

机译:最后一道防线,保证并提供足够的可靠性/ AUTH CODE

摘要

1.the computer u0441u043au043eu043du0444u0438u0433u0443u0440u0438u0440u043eu0432u0430u043du043du044bu0439 u0434u043bu00a0 u0432u044bu043fu043eu043bu043du0435u043du0438u00a0 self checking the correctness of a processor; u043fu0430u043cu00a0u0442u044c, via the connected to the cpu; the verification of correctness. via the connected to the processor and u043fu0430u043cu00a0u0442u0438 and schema validation of accomplished with the computer and get the opportunity u043fu0440u043eu0432u0435u0440u00a0u0442u044c characteristics rect implemented with the possibility to limit the work computerwhen the validation fails.;2. computer 1, further containing a u0438u043du0438u0446u0438u0438u0440u043eu0432u0430u043du0438u00a0 to u043eu043fu0440u0435u0434u0435u043bu0435u043du0438u00a0 interval u0434u043bu00a0 make the validate test rule computer u043bu044cu043du043eu0441u0442u044c characteristics during this interval.;3. computer 2, in which the interval u00a0u0432u043bu00a0u0435u0442u0441u00a0 one statistics, fixed and random.;4. computer 2, in which the validation occurs with increased frequency after the validation fails.;5. computer 1, which contains a cryptographic scheme to verify the correctness.;6. computer 1, in which the characteristic of u00a0u0432u043bu00a0u0435u0442u0441u00a0 one: digital manner signed program code, hash function, the range of action of u043fu0430u043cu00a0u0442u0438, u0438u0441u0442u0435u0447u0435u043du0438u00a0 u0432u0438u0442u0435u043bu044cu043du043eu0441u0442u0438 computer code, the cancellation of the digital signature, and the expiration date.;7. computer 1, further containing a u043fu0440u0438u043du0443u0436u0434u0435u043du0438u00a0, responsive to the validation of the computer, u0434u043bu00a0 u043eu0433u0440u0430u043du0438u0447u0435u043du0438u00a0 functions when control rights u0438u043bu044cu043du043eu0441u0442u0438 fails.;8. computer 1, in which the processor contains a scheme to verify the correctness.;9.the validation of the computer, and the validation of contains a u0438u043du0438u0446u0438u0438u0440u043eu0432u0430u043du0438u00a0; logic, via the connected to the pattern initiated u0438u00a0; and u043bu043eu0433u0438u0447u0435u0441u043au0430u00a0 scheme serves as a u0434u043bu00a0 verification scheme u043fu0440u0438u043du0443u0436u0434u0435u043du0438u00a0, characteristics of the computer;via the connected to a verification scheme; the scheme u043fu0440u0438u043du0443u0436u0434u0435u043du0438u00a0 in response to a signal from the logic circuit determines the characteristics of the operation of the computer.;10. the validation of the p.9, further u0441u043eu0434u0435u0440u0436u0430u0449u0430u00a0 cryptographic scheme, the u043bu043eu0433u0438u0447u0435u0441u043au0430u00a0 scheme u0432u0435u0440u0438u0444u0438u0446u0438u0440u0443u0435u0442 u0443u043fu043eu043cu00a0u043du0443u0442u0443u044e characterization using u00a0 u0443u043fu043eu043cu00a0u043du0443u0442u0443u044e cryptographic scheme.;11. the validation of the p.9, in which the u043fu0440u0438u043du0443u0436u0434u0435u043du0438u00a0 limits performance by one of: periodic discharge, u0441u043eu043au0440u0430u0449u0435u043du0438u00a0 productivity the processor and an u0443u043cu0435u043du044cu0448u0435u043du0438u00a0 u0440u0430u0437u0440u0435u0448u0435u043du0438u00a0 u0434u0438u0441u043fu043bu0435u00a0.;12. the validation of the p.9, in which the u0438u043du0438u0446u0438u0438u0440u043eu0432u0430u043du0438u00a0 contains one of the system clock and the random number generator.;13. the validation of the u00a0u0432u043bu00a0u044eu0449u0430u00a0u0441u00a0 p.9, resistant to interference from other components of the computer.;14.authentication method of computer, containing the following steps: providing a validation of the program to verify the correctness of information; the characteristics of the computer; a program to verify the correctness u0434u043bu00a0 revitalization through interval; u0432u044bu043fu043eu043bu043du00a0u044eu0442 check correctness of character u0438u0441u0442u0438u043au0438 computer; limit function computerwhen checking the characteristics of the computer fails.;15. a way to question 14, further containing a programming scheme to validate cryptographic secret.;16. way on p.14, which validate further contains verification in a random interval and the timing interval.;17. way on p.14, which validate further contains one of the verification of the digital signature function code and the verification of the hash functions u043fu0430u043cu00a0u0442u0438 range.;18. a way to question 14, further containing a registration u0442u0435u0440u043fu00a0u0449u0435u0439 failed verification of characteristics of computer and installation of u044du043du0435u0440u0433u043eu043du0435u0437u0430u0432u0438u0441u0438u043cu043eu0433u043e flag to be evaluated after u0440u0435u0441u0442u0430u0440u0442u0430 / reset the computer.;19. a way to question 14, in which the functions of the computer further includes limiting the number of communication messages.;20. a way to question 14, in which the functions of the computer additionally contains one: speed limit and restriction of access to sub set u0432u044bu043fu043eu043bu043du00a0u0435u043cu043eu0433u043e program code.
机译:1.计算机 u0441 u043a u043e u043d u0444 u0438 u0433 u0443 u0440 u0438 u0440 u043e u0432 u0430 u043d u043d u044b u0439 u0439 u0434 u043b u00a0 u0432 u043b u043f u043e u043b u043d u0435 u043d u0438 u00a0自检处理器的正确性; u043f u0430 u043c u00a0 u0442 u044c,通过连接到CPU的方式;正确性验证。通过连接到处理器和 u043f u0430 u043c u00a0 u0442 u0438以及通过计算机完成的架构验证,并获得机会 u043f u0440 u043e u0432 u0432 u0435 u0440 u00a0 u0442 u044c当验证失败时,可能会限制工作计算机; 2。计算机1,进一步包含 u0438 u043d u0438 u0446 u0438 u0438 u0440 u043e u0432 u0430 u043d u0438 u00a0到 u043e u043f u0440 u0435 u0434 u0434 u0435 u043b u0435 u043d u0438 u00a0间隔 u0434 u043b u00a0在此间隔内使验证测试规则计算机 u043b u044c u043d u043e u0441 u0442 u044c具有特征; 3。计算机2,其中间隔 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0一个统计值,固定且随机。计算机2,其中在验证失败后,以增加的频率进行验证; 5。计算机1,其包含用于验证正确性的加密方案; 6。计算机1,其中 u00a0 u0432 u043b u00a0 u0435 u0442 u0441 u00a0的特征之一:数字方式签名程序代码,哈希函数, u043f u0430 u043c u00a0 u0442的作用范围 u0438, u0438 u0441 u0442 u0435 u0447 u0435 u043d u0438 u00a0 u0432 u0438 u0442 u0435 u043b u044c u043d u043e u043e u0441 u0442 u0438数字签名以及有效期; 7。计算机1,进一步包含 u043f u0440 u0438 u043d u0443 u0436 u0434 u0435 u043d u0438 u00a0,以响应计算机的验证 u0434 u043b u00a0 u043e u0433 u0440 当控制权 u0438 u043b u044c u043d u043e u0441 u0441 u0442 u0438失败时,u0430 u043d u0438 u0447 u0435 u043d u0438 u00a0起作用; 8。计算机1,其中处理器包含验证正确性的方案; 9。计算机的验证,并且的验证包含 u0438 u043d u0438 u0446 u0438 u0438 u0440 u043e u0432 u0430 u043d u0438 u00a0;逻辑上,通过连接到模式启动的 u0438 u00a0;和 u043b u043e u0433 u0438 u0447 u0435 u0441 u043a u0430 u00a0方案用作 u0434 u043b u00a0验证方案 u043f u0440 u0438 u043d u043d u0443 u0436 u0434 u0435 u043d u0438 u00a0,计算机的特征;通过连接到验证方案;响应来自逻辑电路的信号,方案 u043f u0440 u0438 u043d u0443 u0436 u0434 u0435 u043d u0438 u00a0确定计算机操作的特性。10。第9页的验证,进一步 u0441 u043e u0434 u0435 u0440 u0436 u0430 u0449 u0430 u00a0加密方案, u043b u043e u0433 u0438 u0447 u0447 u0435 u0441 u043a u0430 u00a0方案 u0432 u0435 u0440 u0438 u0444 u0438 u0446 u0438 u0440 u0443 u0435 u0442 u0443 u043f u043e u043c u00a0 u043d u0443 u0442 u0443使用 u00a0 u0443 u043f u043e u043c u00a0 u043d u0443 u0442 u0443 u044e加密方案。; 11。第9页的验证,其中 u043f u0440 u0438 u043d u0443 u0436 u0434 u0435 u043d u0438 u00a0通过以下方式之一限制性能:定期放电, u0441 u043e u043e u043a u0440 u0430 u0449 u0435 u043d u0438 u00a0生产率和一个 u0443 u043c u0435 u043d u044c u0448 u0435 u043d u043d u0438 u00a0 u0440 u0430 u0430 u0437 u0440 u0435 u0448 u0435 u043d u0438 u00a0 u0434 u0438 u0441 u043f u043b u0435 u00a0。; 12。 p.9的验证,其中 u0438 u043d u0438 u0446 u0438 u0438 u0440 u043e u0432 u0430 u043d u0438 u00a0包含系统时钟和随机数发生器之一。 13 u00a0 u0432 u043b u00a0 u044e u0449 u0430 u00a0 u0441 u00a0 p.9的验证,可抵御来自计算机其他组件的干扰。; 14.计算机的身份验证方法,包含以下步骤:对程序进行验证,以验证信息的正确性;计算机的特征;一个程序,通过时间间隔来验证正确性; u0432 u044b u043f u043e u043b u043d u00a0 u044e u0442检查字符 u0438 u0441 u0442 u0438 u043a u0438的正确性;检查计算机特性失败时限制计算机功能; 15。问题14的方法,还包含一个用于验证密码机密的编程方案; 16。第14页的方法,该方法进一步包含在随机间隔和定时间隔中进行验证。; 17。第18页的方法,该验证还包含数字签名功能代码的验证和哈希函数 u043f u0430 u043c u00a0 u0442 u0438范围之一的验证。问题14的方法,进一步包含注册 u0442 u0435 u0440 u043f u00a0 u0449 u0435 u0439计算机特征验证失败和 u044d u043d u0435 u0440 u0433 u043e u043d u0435 u0437 u0430 u0432 u0438 u0441 u0438 u043c u043e u0433 u043e标志在重新设置计算机后重新评估。19。问题14的方法,其中计算机的功能还包括限制通信消息的数量。20。问题14的方法,其中计算机的功能另外包含一个:速度限制和对子集的访问限制 u0432 u044b u043f u043e u043b u043d u00a0 u0435 u043c u043e u0433 u043e程序代码。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号